Results 141 to 150 of about 22,394,325 (191)
Some of the next articles are maybe not open access.

A Security Architecture for Data Privacy and Security

2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture
openaire   +2 more sources

DATA PROTECTION — SECURITY

Computer Law & Security Review, 2002
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire   +2 more sources

Ensure Hierarchal Identity Based Data Security in Cloud Environment

International Journal of Cloud Applications and Computing, 2019
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled.
S. Kaushik, C. Gandhi
semanticscholar   +1 more source

Data Security and Privacy in Fog Computing

IEEE Network, 2018
Cloud computing is now a popular computing paradigm that can provide end users access to configurable resources on any device, from anywhere, at any time. During the past years, cloud computing has been developed dramatically.
Yunguo Guan   +3 more
semanticscholar   +1 more source

An improved attribute‐based encryption technique towards the data security in cloud computing

Concurrency and Computation, 2019
With the rapid development of the Internet, resource and knowledge sharing are two major problems experienced due to the presence of many hackers and malicious users.
Suyel Namasudra
semanticscholar   +1 more source

PerfectDedup: Secure Data Deduplication [PDF]

open access: possible, 2016
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Puzio, Pasquale   +3 more
openaire   +1 more source

Data Access and Security

2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire   +2 more sources

Securing Your Data

2010
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire   +2 more sources

Designing Secure Data Warehouses

2006
Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data.
Rodolfo Villarroel   +3 more
openaire   +1 more source

Data security

Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire   +2 more sources

Home - About - Disclaimer - Privacy